WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for privilege

(...) ns any other values, the form field will be invisible. On the other hand, if the person designing the workflow wants a given form field to be always visible in Instance history, regardless of user privilege s and the entered rule, then they should check the Always show in instance history checkbox in the same tab.   Fig. 8. Contents of the Visibility tab with Visibility restriction on form (...)

(...) atabase creation” node and the window it opens       After clicking the button, it is possible to define the database parameters, such as name and user (obtains owner privilege s for the created database). Once you fill out all the required fields and click the “Create” button, the installer shows a summary of parameters defined for the database. Confirming them (...)

(...) upper right corner of Portal and then Install MS Office add-ins and Outlook Classic.       Note: for the installation to be possible, the user must have administrator privilege s on the local machine. Alternatively, the add-in can be installed globally in an Active Directory environment with properly defined Group Policy, in which case the local user does not need to have ad (...)

(...) bscription models User licenses in the perpetual model: WEBCON BPS User CAL – the user may access all processes and applications built in WEBCON BPS (as long as they have the necessary privilege s). This access involves the ability to create new instances, edit and save them, move them to other steps via paths, and browse reports and applications. Through this license, a specific number of (...)

(...) it is possible to define an account that will be used as the sender instead of the default sender address. This can be either an E-mail address or a Distribution group with “Send as” privilege s.   This feature called Allow "Send as" needs to be enabled in the System Settings, and once it is active it will be possible to substitute the sender address with a differe (...)

(...) Applies to version 2023.1.x and above, authors: Dawid Golonka, Krystyna Gawryał   Introduction BPS groups is a solution that facilitates the assignment of tasks and the management of privilege s granted to individual system users. This solution can be used in both standalone and cloud installations. The Export-Import mechanism makes it possible to transfer BPS groups with the application to a (...)

(...) ere is an attachment" action in WEBCON BPS Designer Studio according to the provided prototype documentation   After performing all necessary tests, providing credentials, and granting privilege s, the implementation team releases the application for use in the enterprise.   Using the application and Edit mode While using the application, one of the employees carrying out tasks (...)

(...) Indicators per process After selecting Overview, user will see Key application indicators, and more precisely, the Per process tab, whose content will vary depending on the applications used and privilege s granted. The data of individual applications in the report are grouped and displayed according to the current state, in alphabetical order, just like in WEBCON BPS Designer Studio. When you click (...)

(...) onality in a selected process, check the Enable instance and task sharing button in the “Sharing” section. Once it is checked, other fields placed in the section become editable, i.e. privilege s level and Default sharing expiration time (in days). The “privilege s level” option contains a drop-down list that allows you to specify whether the instances are shared with edition (Edi (...)

(...) r panel → “Administration” → Change requests). (The configuration window is identical in both cases.) Please note that for change requests, an administrator is a person with privilege s of either system administrator, application administrator, or supervisor.   NOTE: the change request functionality is not supported when working on behalf of another user. A new op (...)

(...) e RAM used. It is possible to configure additional variables, --mount source=solr-bps,target=/var/solr – mapping the created volume to the container directory where files with search indexes, privilege configuration, and log files will be stored, bash –c “/opt/bps-solr/scripts/run-precreate-cores.sh” – path to the script that initializes Solr index structures. This script (...)

(...) d, after the upgrade communication with the database will take place as before (without using the bps_user account). This article aims to take a closer look at the application of this account, its privilege s and associated limitations.   Scope of application The ability to add a dedicated account for reading data from the database already existed in earlier versions of the system, but now (...)

(...) bsp; Pressing the button opens a window containing a QR code that you can send to other users, allowing them to quickly initiate a relevant workflow instance, provided that they have the necessary privilege s.   Keep in mind that you can open the QR code using either the system-based QR code scanner or the scanner built into the mobile application. In the first situation, after scanning th (...)

(...) sp;the following places: Person or group fields Item list columns that Use people field data source The Any person option in predefined task assignment Delegating tasks on Portal Adding privilege s through admin action on Portal Business rule functions in the “Users” node, e.g. CURRENT USER IS ONE OF, USER IS ONE OF, etc. privilege s at Global, Application, Process, and Workflow (...)

(...) io, specifically the Lite mode.      What is the Lite mode in Designer Studio? The Lite mode is a functionality that allows users to work in Designer Studio with limited privilege s. It enables users to access only the functionalities associated with the context of a particular application, preventing unauthorized access to the full configuration or specific areas of Designer S (...)

(...) ments).   Now backtrack to the Service status node and activate the service. Any errors that occur will be saved in the Event viewer. The most common cause of issues is the lack of privilege s for the service account to the recreated database.   After the service has been activated, return to the License manager and activate the license service. Instructions on how to do so can (...)

(...) e Server 2019 and adhere to the procedure described below: download the ExchangeExtendedProtectionManagement script available here; launch the Exchange Management Shell console with elevated privilege s; retrieve all the IP addresses for which it is possible to restrict access to the virtual directory by entering the following command in the console:  .ExchangeExtendedProtectionManageme (...)

(...) ter but also protects sensitive data.   Compartmentalization of workflows The most fundamental way to control what our users will see and have access to is through the various levels of privilege settings. To make this easier, it is generally a good idea to divide business processes into a number of workflows that can (but don’t have to) be interconnected. Such smaller workflows are muc (...)

(...) o define the scope of the export/import and monitor its progress. However, such an approach could be challenging, for instance, due to limited access to specific environments or a lack of appropriate privilege s. With the 2024 R1 release, functionality was introduced that allows application import operations to be automated and executed using the public API in Portal. This article describes this function (...)

(...) ead of the Department should not be disclosed to their subordinates, a completely new dashboard will be created for them. This task is assigned to a member of an IT Department who holds the necessary privilege s of Application administrator (this operation can be also executed by the System administrator) – we will take on their role in this article. Please note that given the limited dashboard co (...)